PacktPublishing / Learning-Python-for-Forensics-Second-EditionLinks
Learning Python for Forensics, Second Edition, Published by Packt
☆47Updated 2 years ago
Alternatives and similar repositories for Learning-Python-for-Forensics-Second-Edition
Users that are interested in Learning-Python-for-Forensics-Second-Edition are comparing it to the libraries listed below
Sorting:
- Python Digital Forensics [video], published by Packt☆21Updated 2 years ago
- Python Digital Forensics Cookbook, published by Packt☆106Updated 2 years ago
- Learning Python for Forensics by Packt Publishing☆123Updated 2 years ago
- Code for the Python Digital Forensics Cookbook☆63Updated 7 years ago
- Python Digital Forensics Cookbook by Packt☆17Updated 5 years ago
- Penetration Testing with Shellcode, published by Packt☆36Updated 2 years ago
- A repo to support the book☆44Updated 2 years ago
- Digital Forensics with Kali Linux, published by Packt☆96Updated 2 years ago
- ☆90Updated 2 weeks ago
- Advanced Malware Analysis [video], published by Packt☆21Updated 2 years ago
- Hands-On Penetration Testing with Python, published by Packt☆82Updated last year
- Python Penetration Testing for Developers, published by Packt☆40Updated 2 years ago
- Digital Forensics with Kali Linux, Second Edition, Published by Packt☆13Updated 4 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆263Updated 6 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆77Updated 2 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58Updated 5 years ago
- Malware Analysis Techniques, published by Packt☆76Updated 2 years ago
- Black Hat Python for Pentesters & Hackers, published by Packt☆23Updated 4 years ago
- AWS Penetration Testing, published by Packt☆32Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆122Updated 2 years ago
- Best practices in threat intelligence☆48Updated 2 years ago
- Documentation for Zeek☆50Updated last week
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- ☆50Updated 2 years ago
- ☆24Updated 4 years ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- Tools for DFIR☆120Updated 7 years ago
- ATT&CK Evaluations website (DEPRECATED)☆60Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last week
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆178Updated last year